Just some playing around with zdb to get if there are differences between a filesystem or volume and a snapshot.
root@christine:~# zpool status
status: One or more devices are faulted in response to persistent errors.
Sufficient replicas exist for the pool to continue functioning in a
action: Replace the faulted device, or use 'zpool clear' to mark the device
scan: scrub repaired 0 in 2h1m with 0 errors on Mon Mar 13 22:41:57 2017
NAME STATE READ WRITE CKSUM
storage DEGRADED 0 0 0
raidz1-0 ONLINE 0 0 0
WD-WCC4N2AJ9T7E ONLINE 0 0 0
SG-W6A12G2H ONLINE 0 0 0
WD-WCC4N6VCK2TD ONLINE 0 0 0
SG-Z5020FXJ ONLINE 0 0 0
raidz1-1 ONLINE 0 0 0
WD-WCC4N6SXZ3PF ONLINE 0 0 0
SG-W6A12F14 ONLINE 0 0 0
WD-WCC4N4NNTF1P ONLINE 0 0 0
SG-W6A12FMB ONLINE 0 0 0
raidz1-2 DEGRADED 0 0 0
SG-W6A12G0B ONLINE 0 0 0
WD-WCC4N6KV534N ONLINE 0 0 0
SG-W6A12FXS ONLINE 0 0 0
SG-Z5020G18 FAULTED 0 6 0 too many errors
raidz1-3 ONLINE 0 0 0
WD-WCAWZ2194067 ONLINE 0 0 0
SG-Z501ZYA5 ONLINE 0 0 0
WD-WCAWZ2194120 ONLINE 0 0 0
SG-Z5020G17 ONLINE 0 0 0
mirror-4 ONLINE 0 0 0
zil1 ONLINE 0 0 0
zil2 ONLINE 0 0 0
cache1 ONLINE 0 0 0
cache2 ONLINE 0 0 0
errors: No known data errors
root@christine:~# zpool status
scan: scrub repaired 0 in 4h36m with 0 errors on Sun Apr 9 05:00:44 2017
Assume that you have two nodes one with two IPv4 networks and one with one IPv4 network and each with one IPv6 network and we’d like to have a separate connection for the IPv6 stuff
While trying to debug some really weird issue, I’ve noticed that you really really really should use bridge_hw or a pre-up/up/post-up whatever rule to assign a permanent MAC to your bridge.
I had a hard time finding why my OpenVZ containers wouldn’t respond to ping-packets which came in through IPSEC. Some guides suggested to use disable_policy – I did without success. A few days later by accident I realized that you need to do that within the VM.
In one of my previous articles I wrote about an IPSEC transport between two hosts. That was pretty easy to set up (you might take that as basis if you do use this post). All traffic between those two IPs had been encrypted. Now let’s do that for public IP networks instead of just two IPs.
I’ve just made some tests to see how EnhanceIO performs and to see how data=journal and data=ordered perform when using a SSD as external journal device..
To speed things up I’ve decided to give an external journal on a SSD a try. Here’s how.
I’m a long-time OpenVZ user running a few hundred OpenVZ containers and administrating another ~80 at my job for a data center, but actually I am unsure about the OpenVZ 7 thingy. Without even taking a closer look at OpenVZ 7, just by reading the „released“ page, I noticed a few things I don’t like
Recently I took a look at some techniques I always wanted to take a look at. IPSEC for example is one of those techniques. Remembering how long it took my work-colleague to setup an ipsec connection I thought this would be a nightmare. Took him a few days to get a working ipsec connection to a customer appliance – seems that had nothing to do with ipsec. The horrible part was the documentation or rather the lack of proper documentation for that specific Peplink appliance. Anyway, here’s how you can setup ipsec pretty simple and fast.